scientific article; zbMATH DE number 2086725
From MaRDI portal
Publication:4737264
Recommendations
Cited in
(87)- Cost-effective and scalable data sharing in cloud storage using hierarchical attribute-based encryption with forward security
- Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts
- An efficient IBE scheme with tight security reduction in the random oracle model
- Efficient identity-based encryption with hierarchical key-insulation from HIBE
- Reflections on the security proofs of Boneh-Franklin identity-based encryption scheme
- Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters’ IBE Scheme
- Tightly secure (H)IBE in the random oracle model
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Securing information exchange in VANETs by using pairing-based cryptography
- CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption
- Efficient selective identity-based encryption without random oracles
- Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks
- Attribute-based encryption with fast decryption
- CCA-secure identity-based matchmaking encryption from standard assumptions
- Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
- An Identity-Based Key Agreement Protocol for the Network Layer
- scientific article; zbMATH DE number 6866298 (Why is no real title available?)
- Privacy-preserving encryption scheme using DNA parentage test
- Multi-key Hierarchical Identity-Based Signatures
- Secure Hierarchical Identity Based Encryption Scheme in the Standard Model
- Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
- Multi-Identity Single-Key Decryption without Random Oracles
- Use of ID-based cryptography for the efficient verification of the integrity and authenticity of web resources
- Unbounded HIBE with tight security
- Revocable hierarchical identity-based encryption with adaptive security
- A survey on functional encryption
- Efficient updatable public-key encryption from lattices
- You can sign but not decrypt: hierarchical integrated encryption and signature
- Trapdoor delegation and HIBE from middle-product LWE in standard model
- Direct chosen-ciphertext secure identity-based key encapsulation without random oracles
- Fine-grained forward secrecy: allow-list/deny-list encryption and applications
- Hierarchical identity-based encryption with tight multi-challenge security
- On indifferentiable hashing into the Jacobian of hyperelliptic curves of genus 2
- Generic constructions for fully secure revocable attribute-based encryption
- HIERARCHICAL IDENTITY-BASED PROXY RE-ENCRYPTION WITHOUT RANDOM ORACLES
- On the power of hierarchical identity-based encryption
- Identity-Based Online/Offline Encryption
- Identity-based encryption in DDH hard groups
- Efficient revocable identity-based encryption via subset difference methods
- On the Impossibility of Virtual Black-Box Obfuscation in Idealized Models
- HIBE: hierarchical identity-based encryption
- Policy controlled system with anonymity
- Wildcarded identity-based encryption
- Forward-secure encryption with fast forwarding
- The relation and transformation between hierarchical inner product encryption and spatial encryption
- Generic constructions of integrated PKE and PEKS
- Extended dual system group and shorter unbounded hierarchical identity based encryption
- Revocable hierarchical identity-based encryption via history-free approach
- Revocable hierarchical identity-based encryption with shorter private keys and update keys
- Updatable public key encryption in the standard model
- Unique-path identity based encryption with applications to strongly secure messaging
- Identity-based encryption and hierarchical identity-based encryption
- Hierarchical Identity-Based Identification Schemes
- Simplified revocable hierarchical identity-based encryption from lattices
- Verifiable security of Boneh-Franklin identity-based encryption
- Relations between semantic security and anonymity in identity-based encryption
- Supporting dynamic updates in storage clouds with the Akl-Taylor scheme
- scientific article; zbMATH DE number 5524100 (Why is no real title available?)
- Bonsai trees, or how to delegate a lattice basis
- New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
- Traceable receipt-free encryption
- ID-based public key cryptographic systems
- Fine-grained secure attribute-based encryption
- Ciphertext-policy delegatable hidden vector encryption and its application to searchable encryption in multi-user setting
- Generic construction of designated tester public-key encryption with keyword search
- Anonymous HIBE with short ciphertexts: full security in prime order groups
- Practical Identity-Based Encryption Without Random Oracles
- Hierarchical Identity Based Encryption with Polynomially Many Levels
- Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts
- Adaptive-ID Secure Revocable Identity-Based Encryption
- Generalized Identity Based and Broadcast Encryption Schemes
- Fine-grained secure attribute-based encryption
- Revocable hierarchical identity-based encryption: history-free update, security against insiders, and short ciphertexts
- Efficient subtree-based encryption for fuzzy-entity data sharing
- Revocable hierarchical identity-based encryption
- Dual trapdoor identity-based encryption with keyword search
- A fully distributed hierarchical attribute-based encryption scheme
- Signatures in hierarchical certificateless cryptography: efficient constructions and provable security
- Forward-secure identity-based encryption with direct chosen-ciphertext security in the standard model
- Tightly secure hierarchical identity-based encryption
- Hierarchical ID-Based Cryptography
- Compact hierarchical IBE from lattices in the standard model
- SecHome: a secure large-scale smart home system using hierarchical identity based encryption
- Several security schemes constructed using ECC-based self-certified public key cryptosystems
- Indifferentiable deterministic hashing to elliptic and hyperelliptic curves
- Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys
- Hierarchical Identity-Based Broadcast Encryption
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4737264)